Intelligence

Total Page:16

File Type:pdf, Size:1020Kb

Intelligence IR 234: Intelligence: Collection, Espionage, Analysis, Covert Action, Counterintelligence Professor Joe Wippl Course Dates: Fall, 2020 Office: 152 Bay State Road, #301 Course Time & Location: MW, 1010-1125 Email: [email protected] Course credits: 4 Office Hours MW 130-430 and by Appointment Course Description Countless books, movies and film series have portrayed and continue to portray the art and craft of intelligence, mainly as it pertains to espionage and covert action. Almost all popular culture falsely fictionalizes intelligence with portrayals of murder and mayhem. Yet, intelligence collection and analysis are incredibly interesting; they have a never-ending appeal to those seeking influence and adventure. What do intelligence agencies do and why? This course addresses these crucial questions. The objective of this course is to learn and to understand the responsibility of intelligence in the decision making process of policy makers across the world. It will also examine counterintelligence. The course focuses particularly on the United States, which has the most extensive intelligence gathering and analysis capabilities among democracies. While every country on earth has at least one intelligence agency, the United States has 16 separate intelligence agencies. Together, the U.S. intelligence community spends over 80 billion dollars a year. Since the Presidency of Lyndon Johnson, every American President has started each day with the President’s Daily Brief (PDB). The PDB is prepared in the main by the CIA based on broadly collected open and secret information. The course will familiarize students with the full range of activities undertaken by U.S. intelligence agencies to support the country’s foreign policy objectives, including intelligence gathering, analysis, covert action, and emerging challenges. In addition, the course will present the laws governing intelligence collection and covert action as well as ethical issues that may confront intelligence agencies and professionals. Course Hub Outcomes HUB CAPACITY: Philosophical, Aesthetic, and Historical Interpretation AREA: Historical Consciousness In this course, students will receive a broad outline of the history of intelligence and what intelligence does in the United States. Prior to the twentieth century, intelligence was a constant factor in war and diplomacy beginning with the ancients, through the Middle Ages and into the Modern Era. An example is the intelligence capabilities and interests of George 1 Washington. With the onset of the twentieth century, the beginnings of formalized structures of intelligence organizations were established in Great Britain and spread throughout the world. Students will learn how the concepts and practice of intelligence have changed over time. What does intelligence mean? What does the collection of intelligence mean? Where is intelligence collected? Why is there signal intelligence and why is there imagery intelligence? Why do countries engage in espionage and what actually is espionage? What is covert action and why have so many countries used covert action? What is meant by counterintelligence? How does it defend and protect the security of the citizenry? How and who analyzes all this information for the benefit of the policy maker in any state? Finally, why is it secret? Historical Consciousness Learning Outcomes • Students will create historical narratives, evaluate interpretations based on historical evidence, and construct historical arguments. Students will be exposed to multiple narratives on the practice of intelligence and will develop their own synthesis based on critical reading and analysis. • Students will demonstrate an ability to interpret primary source material (textual, visual, or aural) using a range of interpretive skills and situating the material in its historical and cultural context. Students will be exposed to a variety of primary source materials, including official US national security documents and discussions with former intelligence professionals. These materials will be discussed in the context of their times and places. In addition, the Presidential Daily Brief writing exercises will require students to digest and analyze a variety of primary and secondary source material. • Students will demonstrate knowledge of religious traditions, intellectual paradigms, forms of political organization, or socioeconomic forces, and how these have changed over time. U.S. intelligence law and practice has changed significantly over time, typically in response to crises or evolving societal values. Students will grapple directly with the reasons and options chosen at different points in time. HUB CAPACITY: Diversity, Civic Engagement, and Global Citizenship AREA: Ethical Reasoning Students will learn the legal and ethical obligations of citizens employed in security agencies, and how those vary across jurisdictions and time periods. The development of the American security agencies reflected the time and place in which they were organized. After World War II, a period of consensus on U.S. security policy emerged. Intelligence Agencies were formed according to the law and given vague authorities. The system functioned on the basis of a consensus embedded among government officials, politicians, and the press. This consensus broke down in the early 1970s because of abuses by the intelligence agencies and the emergence of a new generation of leadership. Students will learn how new understandings of 2 the ethical conduct of intelligence have resulted over time in the passage of laws formalizing the legal conduct of intelligence agencies. They will also learn that events influence the authorities of governments. For example, without a defined threat to American property and persons, intelligence agencies are more restricted than when there is a threat. The course addresses the ethical issue facing both institutions and individuals. Given the demands to government to protect the citizenry and the demands for unbiased analysis of situations and events to policy makers, the integrity of personnel in intelligence will remain paramount. Ethical Reasoning Learning Outcomes • Students will be able to identify, grapple with, and make a judgment about the ethical questions at stake in at least one major contemporary public debate, and engage in a civil discussion about it with those who hold views different from their own. The practice of intelligence is a constant exercise in ethical decision making. Students will discuss the ethical and practical considerations of a variety of key debates, including issues of privacy, distinctions between domestic and foreign espionage, unintended side effects of intelligence operations, and the role of secrecy in democratic societies, among others. • Students will demonstrate the skills and vocabulary needed to reflect on the ethical responsibilities that face individuals (or organizations, or societies or governments) as they grapple with issues affecting both the communities to which they belong and those identified as “other.” Students will discuss the ethics of intelligence with reference to different approaches, including utilitarianism, democratic accountability, and personal morality. They will apply notions of professional ethics both to domestic and foreign individuals, groups, and institutions. Course Learning Objectives By the end of this course, students will have achieved the following course learning outcomes: • Demonstrate knowledge of intelligence: including collection, analysis, covert action and counterintelligence. • Demonstrate knowledge of what the contribution of intelligence is to the making of policy by elected leaders and knowledge of the laws governing intelligence. • Demonstrate a sensitivity to the ethical dimensions of decisions made and implemented by intelligence agencies. • Demonstrate writing and analytical skills in short summary works and in oral briefings. Instructional Format, Course Pedagogy, & Approach to Learning 3 This is a lecture and discussion course organized around required weekly readings and the submission of weekly short current international affairs formatted similar to a U.S. Presidential Daily Brief. The purpose is to teach and sensitize students to the rhythm of international relations as it pertains to political, economic and security issues and problems. The study of intelligence in this context will prepare students to understand that international relations are not only relations between the U.S. and other nations but also between other nations. Students are expected to come prepared with the required readings, and participate in class discussions. Books and Other Course Materials Jock Haswell, Spies and Spymasters, Frome & London, Thames and Hudson, 1977. Stephen Knott, Secret and Sanctioned, New York, Oxford University Press, 1996. Britt L. Snider, The Agency and the Hill, Washington, DC, Center for the Study of Intelligence, 2008. Peter Oleson (ed), Guide to the Study of Intelligence, Falls Church, VA, Association of Former Intelligence Officers, 2016. Christopher Moran, Mark Stout, Ioanna Iordanou and Paul Maddrell (editors), Spy Chiefs, Volume I, Washington, D.C., Georgetown University Press. Benjamin Weiser, A Secret Life, The Polish Officer, His Covert Mission, and the Price He Paid to Save His country, New York, Public Affairs, 2004. Jack Devine, Good Hunting, New York, Farrar, Straus and Giroux, 2014. Sandy Grimes and Jeanne Vertefeuille, Circle of Treason, Annapolis, MD, Naval Institute Press, 2012. Mark Lowenthal,
Recommended publications
  • Pakistan-U.S. Relations
    Pakistan-U.S. Relations K. Alan Kronstadt Specialist in South Asian Affairs July 1, 2009 Congressional Research Service 7-5700 www.crs.gov RL33498 CRS Report for Congress Prepared for Members and Committees of Congress Pakistan-U.S. Relations Summary A stable, democratic, prosperous Pakistan actively combating religious militancy is considered vital to U.S. interests. U.S. concerns regarding Pakistan include regional and global terrorism; Afghan stability; democratization and human rights protection; the ongoing Kashmir problem and Pakistan-India tensions; and economic development. A U.S.-Pakistan relationship marked by periods of both cooperation and discord was transformed by the September 2001 terrorist attacks on the United States and the ensuing enlistment of Pakistan as a key ally in U.S.-led counterterrorism efforts. Top U.S. officials praise Pakistan for its ongoing cooperation, although long-held doubts exist about Islamabad’s commitment to some core U.S. interests. Pakistan is identified as a base for terrorist groups and their supporters operating in Kashmir, India, and Afghanistan. Pakistan’s army has conducted unprecedented and, until recently, largely ineffectual counterinsurgency operations in the country’s western tribal areas, where Al Qaeda operatives and pro-Taliban militants are said to enjoy “safe haven.” U.S. officials increasingly are concerned that indigenous religious extremists represent a serious threat to the stability of the Pakistani state. The United States strongly encourages maintenance of a bilateral cease-fire and a continuation of substantive dialogue between Pakistan and neighboring India, which have fought three wars since 1947. A perceived Pakistan-India nuclear arms race has been the focus of U.S.
    [Show full text]
  • Universal GEOINT Credentialing Christopher K
    GEOINT ESSENTIAL BODY OF KNOWLEDGE Transparent Transportable TransIndustry USGIF is a 501(c)(3) non-lobbying, nonprofit educational foundation dedicated to promoting the geospatial intelligence tradecraft and developing a stronger community of interest between Government, Industry, Academia, and Professional Organizations. Almost 500 students Twelve Accredited Geospatial have graduated from Intelligence Certificate Programs Northeastern West Point USGIF-accredited Penn State U. of Utah programs with George Mason UM Columbia Air Force GEOINT Certificates. Redlands Academy Fayetteville State USC UT Dallas U. of South Carolina Did you know USGIF offers hundreds of hours of training, education, and professional development opportunities throughout the year? in Scholarships $792K awarded since 2004 u S gif Monograph Serie S V o L u M e 1 USGIF in 2014 published the Human Geography monograph as a community resource. Socio-Cultural Dynamics and USGIF is developing the first GEOGRAPHYChallenges to Global Security Darryl G. Murdock, Robert R. Tomes and Universal GEOINT Credentialing Christopher K. Tucker, editors Program to bolster profesional development in the GEOINT tradecraft. USGIF produces the GEOINT Symposium, the largest intelligence event in the world. Sustaining Member 240 Organizations TEN YEARS Launched in 2012 as USGIF’s first official print magazine. GEOINT ESSENTIAL BODY OF KNOWLEDGE SECTION I The GEOINT Essential Body of Knowledge �� � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � 3 Transparency and Transportability
    [Show full text]
  • From Air, Sea, and Space, Geospatial Technology Is Helping Nations Monitor One of Their Biggest and Most Understated Threats: the Open Ocean
    » CARDILLO AND LONG Q&A » FUTURE GEOINT LEADERS » SMALLSAT WORKING GROUP 2014 ISSUE 4 THE OFFICIAL MAGAZINE OF THE UNITED STATES GEOSPATIAL INTELLIGENCE FOUNDATION WATCHING THE 2014 USGIF MEMBERSHIP DIRECTORY WATERFrom air, sea, and space, geospatial technology is helping nations monitor one of their biggest and most understated threats: the open ocean. © DLR e.V. 2014 and © Airbus 2014 DS/© DLR Infoterra e.V. GmbH 2014 WorldDEMTM Reaching New Heights The new standard of global elevation models with pole-to-pole coverage, unrivalled accuracy and unique quality to support your critical missions. www.geo-airbusds.com/worlddem CONTENTS 2014 ISSUE 4 The USS Antietam (CG 54), the USS O’Kane (DDG 77) and the USS John C. Stennis (CVN 74) steam through the Gulf of Oman. As part of the John C. Stennis Carrier Strike Group, these ships are on regularly scheduled deployments in support of Maritime Operations, set- ting the conditions for security and stability, as well as complementing counterterrorism and security efforts to regional nations. PHOTO COURTESY OF U.S. NAVAL FORCES CENTRAL COMMAND/U.S. 5TH FLEET 5TH COMMAND/U.S. CENTRAL FORCES NAVAL U.S. OF COURTESY PHOTO 02 | VANTAGE POINT Features 12 | ELEVATE Tackling the challenge of Fayetteville State University accelerating innovation. builds GEOINT curriculum. 16 | WATCHING THE WATER From air, sea, and space, geospatial technology 14 | COMMON GROUND 04 | LETTERS is helping nations monitor one of their biggest USGIF stands up SmallSat Trajectory readers offer Working Group. feedback on recent features and most understated threats: the open ocean. and the tablet app. By Matt Alderton 32 | MEMBERSHIP PULSE Ball Aerospace offers 06 | INTSIDER 22 | CONVEYING CONSEQUENCE capabilities for an integrated SkyTruth and the GEOINT enterprise.
    [Show full text]
  • Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference by Fletcher Schoen and Christopher J
    STRATEGIC PERSPECTIVES 11 Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference by Fletcher Schoen and Christopher J. Lamb Center for Strategic Research Institute for National Strategic Studies National Defense University Institute for National Strategic Studies National Defense University The Institute for National Strategic Studies (INSS) is National Defense University’s (NDU’s) dedicated research arm. INSS includes the Center for Strategic Research, Center for Complex Operations, Center for the Study of Chinese Military Affairs, Center for Technology and National Security Policy, Center for Transatlantic Security Studies, and Conflict Records Research Center. The military and civilian analysts and staff who comprise INSS and its subcomponents execute their mission by conducting research and analysis, publishing, and participating in conferences, policy support, and outreach. The mission of INSS is to conduct strategic studies for the Secretary of Defense, Chairman of the Joint Chiefs of Staff, and the Unified Combatant Commands in support of the academic programs at NDU and to perform outreach to other U.S. Government agencies and the broader national security community. Cover: Kathleen Bailey presents evidence of forgeries to the press corps. Credit: The Washington Times Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference By Fletcher Schoen and Christopher J. Lamb Institute for National Strategic Studies Strategic Perspectives, No. 11 Series Editor: Nicholas Rostow National Defense University Press Washington, D.C. June 2012 Opinions, conclusions, and recommendations expressed or implied within are solely those of the contributors and do not necessarily represent the views of the Defense Department or any other agency of the Federal Government.
    [Show full text]
  • Overhead Surveillance
    Confrontation or Collaboration? Congress and the Intelligence Community Overhead Surveillance Eric Rosenbach and Aki J. Peritz Overhead Surveillance One of the primary methods the U.S. uses to gather vital national security information is through air- and space-based platforms, collectively known as “overhead surveillance.” This memorandum provides an overview of overhead surveillance systems, the agencies involved in gathering and analyzing overhead surveillance, and the costs and benefits of this form of intelligence collection. What is Overhead Surveillance? “Overhead surveillance” describes a means to gather information about people and places from above the Earth’s surface. These collection systems gather imagery intelligence (IMINT), signals intelligence (SIGINT) and measurement and signature intelligence (MASINT). Today, overhead surveillance includes: • Space-based systems, such as satellites. • Aerial collection platforms that range from large manned aircraft to small unmanned aerial vehicles (UAVs). A Brief History of Overhead Surveillance Intelligence, surveillance and reconnaissance platforms, collectively known as ISR, date back to the 1790s when the French military used observation balloons to oversee battlefields and gain tactical advantage over their adversaries. Almost all WWI and WWII belligerents used aerial surveillance to gain intelligence on enemy lines, fortifications and troop movements. Following WWII, the U.S. further refined airborne and space-based reconnaissance platforms for use against the Soviet Union. Manned reconnaissance missions, however, were risky and could lead to potentially embarrassing outcomes; the 1960 U-2 incident was perhaps the most widely publicized case of the risks associated with this form of airborne surveillance. Since the end of the Cold War, overhead surveillance technology has evolved significantly, greatly expanding the amount of information that the policymaker and the warfighter can use to make critical, time-sensitive decisions.
    [Show full text]
  • National Reconnaissance Office Review and Redaction Guide
    NRO Approved for Release 16 Dec 2010 —Tep-nm.T7ymqtmthitmemf- (u) National Reconnaissance Office Review and Redaction Guide For Automatic Declassification Of 25-Year-Old Information Version 1.0 2008 Edition Approved: Scott F. Large Director DECL ON: 25x1, 20590201 DRV FROM: NRO Classification Guide 6.0, 20 May 2005 NRO Approved for Release 16 Dec 2010 (U) Table of Contents (U) Preface (U) Background 1 (U) General Methodology 2 (U) File Series Exemptions 4 (U) Continued Exemption from Declassification 4 1. (U) Reveal Information that Involves the Application of Intelligence Sources and Methods (25X1) 6 1.1 (U) Document Administration 7 1.2 (U) About the National Reconnaissance Program (NRP) 10 1.2.1 (U) Fact of Satellite Reconnaissance 10 1.2.2 (U) National Reconnaissance Program Information 12 1.2.3 (U) Organizational Relationships 16 1.2.3.1. (U) SAF/SS 16 1.2.3.2. (U) SAF/SP (Program A) 18 1.2.3.3. (U) CIA (Program B) 18 1.2.3.4. (U) Navy (Program C) 19 1.2.3.5. (U) CIA/Air Force (Program D) 19 1.2.3.6. (U) Defense Recon Support Program (DRSP/DSRP) 19 1.3 (U) Satellite Imagery (IMINT) Systems 21 1.3.1 (U) Imagery System Information 21 1.3.2 (U) Non-Operational IMINT Systems 25 1.3.3 (U) Current and Future IMINT Operational Systems 32 1.3.4 (U) Meteorological Forecasting 33 1.3.5 (U) IMINT System Ground Operations 34 1.4 (U) Signals Intelligence (SIGINT) Systems 36 1.4.1 (U) Signals Intelligence System Information 36 1.4.2 (U) Non-Operational SIGINT Systems 38 1.4.3 (U) Current and Future SIGINT Operational Systems 40 1.4.4 (U) SIGINT
    [Show full text]
  • Killing Hope U.S
    Killing Hope U.S. Military and CIA Interventions Since World War II – Part I William Blum Zed Books London Killing Hope was first published outside of North America by Zed Books Ltd, 7 Cynthia Street, London NI 9JF, UK in 2003. Second impression, 2004 Printed by Gopsons Papers Limited, Noida, India w w w.zedbooks .demon .co .uk Published in South Africa by Spearhead, a division of New Africa Books, PO Box 23408, Claremont 7735 This is a wholly revised, extended and updated edition of a book originally published under the title The CIA: A Forgotten History (Zed Books, 1986) Copyright © William Blum 2003 The right of William Blum to be identified as the author of this work has been asserted by him in accordance with the Copyright, Designs and Patents Act 1988. Cover design by Andrew Corbett ISBN 1 84277 368 2 hb ISBN 1 84277 369 0 pb Spearhead ISBN 0 86486 560 0 pb 2 Contents PART I Introduction 6 1. China 1945 to 1960s: Was Mao Tse-tung just paranoid? 20 2. Italy 1947-1948: Free elections, Hollywood style 27 3. Greece 1947 to early 1950s: From cradle of democracy to client state 33 4. The Philippines 1940s and 1950s: America's oldest colony 38 5. Korea 1945-1953: Was it all that it appeared to be? 44 6. Albania 1949-1953: The proper English spy 54 7. Eastern Europe 1948-1956: Operation Splinter Factor 56 8. Germany 1950s: Everything from juvenile delinquency to terrorism 60 9. Iran 1953: Making it safe for the King of Kings 63 10.
    [Show full text]
  • Preserving Ukraine's Independence, Resisting Russian Aggression
    Preserving Ukraine’s Independence, Resisting Russian Aggression: What the United States and NATO Must Do Ivo Daalder, Michele Flournoy, John Herbst, Jan Lodal, Steven Pifer, James Stavridis, Strobe Talbott and Charles Wald © 2015 The Atlantic Council of the United States. All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means without permission in writing from the Atlantic Council, except in the case of brief quotations in news articles, critical articles, or reviews. Please direct inquiries to: Atlantic Council 1030 15th Street, NW, 12th Floor Washington, DC 20005 ISBN: 978-1-61977-471-1 Publication design: Krystal Ferguson; Cover photo credit: Reuters/David Mdzinarishvili This report is written and published in accordance with the Atlantic Council Policy on Intellectual Independence. The authors are solely responsible for its analysis and recommendations. The Atlantic Council, the Brookings Institution, and the Chicago Council on Global Affairs, and their funders do not determine, nor do they necessarily endorse or advocate for, any of this report’s conclusions. February 2015 PREFACE This report is the result of collaboration among the Donbas provinces of Donetsk and Luhansk. scholars and former practitioners from the A stronger Ukrainian military, with enhanced Atlantic Council, the Brookings Institution, the defensive capabilities, will increase the pros- Center for a New American Security, and the pects for negotiation of a peaceful settlement. Chicago Council on Global Affairs. It is informed When combined with continued robust Western by and reflects mid-January discussions with economic sanctions, significant military assis- senior NATO and U.S.
    [Show full text]
  • Unmanned Systems Sentinel
    Unmanned Systems Sentinel All opinions expressed within this newsletter are those of the respective author or authors and do not represent the official policy or positions of the Naval Postgraduate School, the United States Navy, or any other government entity. Approved for public release; distribution is unlimited. Thanks to Robin Alexander, Mark Rindler and Marcy Huber for providing several of the below articles. 22 MAY 2016 Please keep in mind that in most instances the below summaries are excerpts from the original article. The full articles can be viewed at the accompanying hyper-links. The inclusion of these links does not represent an endorsement of the organization, service, or product. Immediately below are this edition’s highlights with links to the respective articles: NAVY/USMC: AeroVironment details Blackwing UAS (Navy to Deploy Submarine-Launched Drones) Navy Researchers to Test UAV Swarming Technology this Summer USN Expects More Development of Stingray Timeline This Year ARMY: US Army Special Operations Has Big Appetite for ISR – UAS Army tests prepare for all-domain warfare US Army tests GBSAA system Army Mulls Hybrid Electric for Next Gen Drones USAF: USAF’s Small UAS roadmap calls for swarming ‘kamikaze’ drones USAF to go small on UAS NATIONAL AIR SPACE: California has the Most Drones in US (Excellent tables and illustrations) FAA Expands Drone Detection Pathfinder Initiative FAA Key Initiatives – UAS FAA Releases Drone Registration Location Data FAA and FBI Test Drone Detection A Look Back at April Drone Law Developments:
    [Show full text]
  • Download File
    Remote Controlled Restraint The Effect of Remote Warfighting Technology on Crisis Escalation Erik Lin-Greenberg Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the Graduate School of Arts and Sciences COLUMBIA UNIVERSITY 2019 © 2019 Erik Lin-Greenberg All rights reserved ABSTRACT Remote Controlled Restraint: The Effect of Remote Warfighting Technology on Crisis Escalation Erik Lin-Greenberg How do technologies that remove warfighters from the front lines affect the frequency and intensity of military confrontations between states? Many scholars and policymakers fear that weapons that reduce the risks and costs of war – in blood and treasure – will lead states to resort to force more frequently during crises, destabilizing the international security environment. These concerns have featured prominently in debates surrounding the proliferation and use of remote warfighting technologies, such as drones. This project sets out to evaluate whether and how drones affect crisis escalation. Specifically, do drones allow decisionmakers to deploy military forces more frequently during interstate crises? Once deployed, how do these systems affect escalation dynamics? I argue that drones can help control escalation, raising questions about scholarly theories that suggest the world is more dangerous and less stable when technology makes conflict cheaper and less risky. At the core of this project is a theory of technology-enabled escalation control. The central argument is that technologies like drones that remove friendly forces from the battlefield may lead states to use force more frequently, but decrease the likelihood of escalation when used in lieu of inhabited platforms. More specifically, these technologies lower the political barriers to initiating military operations during crises, primarily by eliminating the risk of friendly force casualties and the associated domestic political consequences for launching military operations.
    [Show full text]
  • Perspectives and Opportunities in Intelligence for U.S. Leaders
    Perspective EXPERT INSIGHTS ON A TIMELY POLICY ISSUE September 2018 CORTNEY WEINBAUM, JOHN V. PARACHINI, RICHARD S. GIRVEN, MICHAEL H. DECKER, RICHARD C. BAFFA Perspectives and Opportunities in Intelligence for U.S. Leaders C O R P O R A T I O N Contents 1. Introduction ................................................................................................. 1 2. Reconstituting Strategic Warning for the Digital Age .................................5 3. Unifying Tasking, Collection, Processing, Exploitation, and Dissemination (TCPED) Across the U.S. Intelligence Community ...............16 4. Managing Security as an Enterprise .........................................................25 5. Better Utilizing Publicly Available Information ..........................................31 6. Surging Intelligence in an Unpredictable World .......................................44 7. Conclusion .................................................................................................56 Abbreviations ................................................................................................57 References ....................................................................................................58 Acknowledgments ........................................................................................64 About the Authors .........................................................................................64 The RAND Corporation is a research organization that develops solutions to public policy challenges to help make
    [Show full text]
  • A Counterintelligence Reader, Volume 1, Chapter 1
    CHAPTER 1 The American Revolution and the Post-Revolutionary Era: A Historical Legacy Introduction From 1774 to 1783, the British government and its upstart American colony became locked in an increasingly bitter struggle as the Americans moved from violent protest over British colonial policies to independence As this scenario developed, intelligence and counterintelligence played important roles in Americas fight for freedom and British efforts to save its empire It is apparent that British General Thomas Gage, commander of the British forces in North America since 1763, had good intelligence on the growing rebel movement in the Massachusetts colony prior to the Battles of Lexington and Concord His highest paid spy, Dr Benjamin Church, sat in the inner circle of the small group of men plotting against the British Gage failed miserably, however, in the covert action and counterintelligence fields Gages successor, General Howe, shunned the use of intelligence assets, which impacted significantly on the British efforts General Clinton, who replaced Howe, built an admirable espionage network but by then it was too late to prevent the American colonies from achieving their independence On the other hand, George Washington was a first class intelligence officer who placed great reliance on intelligence and kept a very personal hand on his intelligence operations Washington also made excellent use of offensive counterintelligence operations but never created a unit or organization to conduct defensive counterintelligence or to coordinate its
    [Show full text]